Vol 2 Part 1: IP Access Control Lists Flashcards
What layer does error recover and flow control happen at?
Layer 4
Between UDP and TCP, which provides error recover?
TCP
TCP is defined in RFC# what?
RFC 793
Multiplexing relies on a concept known as a BLANK
Socket
What are the 3 things inside of a socket?
IP Address, Transport Protocol, and Port Number
What is multiplexing?
Streaming multiple pieces of data within a single stream.
What do the port numbers determine when multiplexing?
Port numbers are used to determine the data and its destined application
What range of ports are the well known ports that are assigned by the Internet Assigned Numbers Authority (IANA)?
0-1023
What range of ports are considered user registered ports?
1024-49151
What are the two types of general protocols used with connections?
Connection-oriented (TCP) and connectionless (UDP)
Connection-oriented protocols require an exchange of messages before or after data transfer begins?
Before. A pre established correlation is made between two endpoints. This is TCP.
True or Fales: Connectionless protocols do NOT require an exchange of messages or correlation?
TRUE
What fields within the TCP header are used to ensure reliability of data transfer?
SEQ and ACK
Windowing allows the receiving end to let the sending end know what?
How much data it can receive at the current moment
The receiving device will send a BLANK message to the sender to indicate either an increase or a decrease in its availability to receive data.
Window message
What is the uniform resource identifier (URI)?
The web address typed or clicked ot access a page
What are the three key components of a URI?
Protocol, Server Name, and Web Page
Web pages typically have multiple files called BLANK
objects
What are the two basic types of Access Control Lists (ACLs)?
Standard and Extended
Standard and Extended ACLs have two main sub types; what are they?
Numbered and Named
What is the difference between a standard and an extended ACL?
A standard ACL just uses a matching Source IP
An extended ACL using a matching source AND destination IP, as well as a source and destination port.
Where do ACLs reside?
On the router
What command is used to create an ACL?
ip access-list standard or extended name of ACL
When creating a rule to permit/deny a range of IP addresses, what is typed in after the IP address to signify the range of IPs?
A wildcard